SECURITY - IDG Communications

Download Report

Transcript SECURITY - IDG Communications

SECURITY:
“Back to the Future”:
Revisiting Trusted
Computer Systems
as a Basic Protection
Requirement
1
"For many, the cyber threat is hard to understand;
no one has died in a cyberattack, after all, there
has never been a smoking ruin for cameras to
see,"
"It is the kind of thinking that said we never had
a major foreign terrorist attack in the United
States, so we never would;
al Qaeda has just been a nuisance,
so it never will be more than that."
Richard A Clarke, 8 April 2003
Reported Testimony before House Government Reform Subcommittee, USA/ 8-4-2003
Richard A Clarke (former Cybersecurity Advisor to Whitehouse)
2
Report: 8 April 2003, Washington Post at http://www.washingtonpost.com
9 April 2003
3
4
5 THEMES:
1. computer security
needs radical
attention after over
20 years of neglect
5
5 THEMES:
2. computer security technology
- understood for over 25
years
BUT associated products
limited
move beyond
“perimeter” security
6
5 THEMES:
3. response in commodity
IT products - almost nonexistent - no market for
“trusted” computer systems
7
5 THEMES:
4. CIOs and IT professionals - take lead!
- warn senior management of risks
and consequences
- say “no” to the use of cheap,
commodity products for mission
critical system under the threat of
legal action to both themselves and
their boards
8
5 THEMES:
5. government must step in to cause the
industry
- to “lift its game” in this area, as in
automobile, pharmaceuticals, food
and like industries,
- unless, via education and training,
the market for security can be lifted
by normal market forces
in a rapid manner
?
9
Today’s
Context.
10
“Sunday” – Channel 9, 6 April 2003.
Menangle Bridge, NSW – CLOSED 27 Mar ’03
WARNED 6 Mar ‘03
NSW Transport Services (Rail)
“…They’re frightened of bringing bad reports to
the Government….
….. They’ve been managed
for good news..”
11
AUSTRALIAN FINANCIAL REVIEW
15 April 2003.
“Judge urges directors to end
‘climate of fear’. “
ASIC Chair, Mr David Knott: ”Business and its advisors need
to demonstrate by their conduct and their actions that the
government and corporate regulators have been justified in
refraining from more radical surgery.”
HIH
Royal
Commission
12
BUSINESS
IMPERATIVES
13
IMPERATIVES
• LEGISLATORS
• DIRECTORS
• MANAGERS
• IT PROFESSIONALS
14
IMPERATIVES
IT PROFESSIONALS
• Development
• Deployment
• Operation
Roles
&
Obligations
• Investigation
• Litigation
15
COMPUTER
SECURITY
16
17
September 2002
Otellini
18
COMPUTERS
• The basis for protection on the Internet.
• General purpose and embedded
IT’S NOT THE ‘NET
IT’S THE NODES !
19
Forrester
March 2003
“Can Microsoft
Be Secure?”
• 74% of users don’t
trust Microsoft
security
• 9 out of 10 users
deploy sensitive
applications on
20 .
Windows, anyway
“..I’m not proud…
We really haven’t done
everything we could to
protect our customers
…. Our products just
aren’t engineered for
security”
Brian Valentine
Senior Vice-President
Microsoft Windows
Development
Computerworld (Australia)
September 16, 2002.
Page 14.
21
VENDOR ESCAPE:
MICROSOFT
(Mundie, 8 Oct. 2002, RSA, Paris)
• Question: 25 years to go “trustworthy” ?
• Reply:
• “Customers wouldn’t pay for it until recently.
• “Information officers ..only recently begun to
demand security.”
• “.. Only in last 10 years that Microsoft has
attempted to play in the security-requiring
worlds of banking, payroll and networked
systems…”
22
WINDOWS NT / 2000 / XP EXPERIENCE
“Although each Win32 process has its own private
memory space, kernel-mode operating system
and device driver code share a single virtual
Every IT professional
address space…Windows
2000 doesn't provide
learn
how to system memory
any protection to can
private
read/write
write a running
driver! in kernel mode.
being used by components
In other words, once in kernel mode, operating
system and deviceEvery
driver user
code can
has complete access
installand
a driver!
to system space memory
can bypass Windows 2000 security
D and Russinovich, M
to access objects." Solomon,
"Inside Microsoft Windows 2000" - Third Edition
Microsoft Press, Redmond, Washington. USA., 2000
23
ATTITUDE
ENVIRONMENT
MARKET
1980s
IBM Advertisement,
BYTE Magazine : Dec. 1985.
IBM PC Ad – 1981. 24
eWeek
April 18, 2003
Securing Windows Server 2003
By Dennis Fisher
SAN FRANCISCO—The upcoming release of Windows Server
2003 is a watershed event, not only for the Windows group, but
also for the security team at Microsoft Corp. Company
executives have made it quite clear over the last few months
that the next version of the flagship operating system will be a
key test for the processes and improvements made as part of
the Trustworthy Computing initiative.
In fact, Dave Aucsmith, chief technology officer of the Security
Business Unit at Microsoft, based in Redmond, Wash., said if
the OS is found to be as vulnerable as previous versions of
Windows, it will mean that the company's model for improving
security "was wrong."
Solution: Look at the base!
25
The riches won't flow until Wi-Fi security reaches industrial
grade. Corporations are hankering for the power and
flexibility of Wi-Fi networks, but many are postponing rollouts
in strategic areas until they're convinced that hackers, spies,
and competitors can't intercept wireless data. General Motors
Corp. has deployed Wi-Fi in 90 manufacturing plants but is
holding off on Wi-Fi at headquarters until next year. Why?
Execs worry that until new encryption is in place, guests at a
Marriott Hotel (MAR ) across the street could log on to GM's
network and make off with vital memos and budgets. Industry
analysts say a slew of airtight Wi-Fi security systems will be
out next year. But delays or news of security breaches could
pummel confidence in the technology.
BW
28 April 2003
THE PROBLEM CONTINUES !
SECURE FROM THE START ?
26
ADD-IN
SECURITY
27
“End systems must be able to enforce the
separation of information based on
confidentiality and integrity requirements
to provide system security.
Operating system security mechanisms are
UNDENIABLE
the foundation for
ensuring such separation.
Unfortunately, existing
mainstream operating systems
EXPERT
lack the critical security feature required
TESTIMONY
for enforcing separation:
mandatory access control.
As a consequence, application
security mechanisms
IN
are vulnerable to tampering and bypass,
and malicious orLITIGATION
flawed applications can !easily
cause failures in system security.”
N N
S A
A I
& L
a
b
s.
18
Dec.
2000
28
TCPA
Trusted Computing Platform Alliance
• 145 PC & related manufacturers/enterprises at
30 Jan 2001
UNDENIABLE
• Main specification - 25 January 2001
EXPERT
• “ … a sensible layperson should trust only those
TESTIMONY
systems that
have been publicly examined
by the (cryptographic
INand security)
community…”
LITIGATION
! THIS need.
• Implied: Current
PCs DO NOT MEET
• For a while - detection vs prevention
29
OKENA - CISCO ( April 2003 )
INSIDE
THE
COMPUTER
OS
30
CRYPTO INTEGRATION
“.. hardware on which applications run must
be secure, as must the operating system and
run time environment in between, while
offering a reasonable API for application
developers…
.. applications cannot be more secure than
the kernel functions they call, and the
operating system cannot be more secure than
the hardware that executes its commands..”
Dyer et al – “Building the IBM 4758 Secure Coprocessor”
IEEE Computer, October 2001.
31
32
What’s in a Name?
• The technology formerly known as
“Palladium” from 24 January 2003 will be
called:
“Next-Generation Secure
Computing Base for Windows”
–NGSCBW ???
Real security architecture or another BIG patch?
33
MS says NGSCBW is…
• Code name for core components of
Windows OS that combine hardware and
software to ensure:
• System integrity
• Personal privacy
• Information protection
• Needs the commitment of the entire
computer industry (software, hardware,
ISPs, etc)
From Presentation “Trustworthy Computing and Palladium” John
Manferdelli – General Manager Windows Trusted Platform
Technologies. Downloaded from
http://www.netproject.com/presentations/ TCPA/john_manferdelli.pdf
34
WEB
SERVICES
35
“Building castles on quicksand”
AUTH
ROLE
PRIV
POLIC
TRUST
AUDIT
WEB SERVICES SECURITY
OPERATING SYSTEM SECURITY
MIDDLEWARE SECURITY
HARDWARE SECURITY
36
TODAY
37
Conclusions (1)
•
The 20 year syndrome in action –
- Intel and Microsoft
– better & easier solutions exist!
– Selective IT industry amnesia
• Nothing was done
before the PC and 1982!
– All useful IT research is on the Web
• Intel, Microsoft & TCPA:
Read the Intel manuals !
Read the literature !
• Government action IS needed! (Forget “light touch”!)
Multics
GEMSOS
DEC VAX
Trusted XENIX
Intel 286
38
Security
IS NOT &
NEVER HAS
been market led or
vendor driven
e.g.
seat belts,
fire extinguishers,
smoke detectors,
pool fences,
etc.
39
Motor Vehicle Standards Act 1989
Act No. 65 of 1989 as amended
Consolidated as in force on 20 April 1999
(incudes amendments up to Act No. 8 of 1999)
Prepared by the Office of Legislative Drafting,
Attorney-General’s Department, Canberra
AN EXCELLENT & PROVEN MODEL !
INDUSTRY TECHNICAL STANDARDS
WITH LEGISLATIVE ENFORCEMENT
40
CONCLUSIONS (2)
• Trusted Systems with
Mandatory Security
as enterprise servers
• Moving beyond perimeter
security which is impractical for
web-services (CIL parsing?)
• Plain English evaluation docs!
• Separate TCP/IP networks
for critical
B2B e-commerce
41
HP-UX 11i ( CAPP/EAL4 )
HP-UX 11i is Hewlett-Packard’s UNIX®-based operating
environment specifically targeted at Internet applications.
HP-UX 11i delivers an end-to-end scalable, manageable, and
secure infrastructure for developing, deploying, and brokering
mission-critical e-services. HP-UX 11.11 has been submitted
for evaluation to the Common Criteria evaluation assurance
level EAL4, against the functional requirements in the
Controlled Access Protection Profile. The target environment is
for systems that may execute on a single HP 9000 Server or
be connected to other HP 9000 Servers identically
configured to form a local distributed system
implementing a unified security policy.
Solution: HP Virtual Vault !!
?
42
HP-UX BLS / Virtual Vault
Virtualvault is built on a
security hardened version
of the HP-UX
operating system
43
IBM
AIX Version 4.3.1
B1/EST-X Vers 2.0.1
44
Trusted Solaris 8 4/01 … multilevel trusted operating environment
Meets and exceeds
• Labeled Security,
• Role-based Access Control, and
• Controlled Access
protection profiles of the Common Criteria.
Features include:
• MAC and DAC - including ACLs;
• Least privilege Trusted networking and trusted NFS;
• Identification and authentication;
• Roles for separating user and administration capabilities;
• Rights profiles;
• Multilevel windowing environment;
• Centralized administration ….;
• Auditing actions of users and roles.
45
Windows’2000 ( CAPP/EAL4 )
As for HP-UX 11i
“ .. to be used in .. a relatively benign environment…..”
“ .. all information on the system .. same level ..”
“.. All users authorized for that level of information ..
not all the data…”
“ users not expected to be trustworthy..”
“ administrators are assumed to be trusted and
competent…
“ ..all elements of the network operate under the
same security rules and constraints and are
subsumed under a single management domain…”
Translation: Forget Internet connection!
46
CONCLUSIONS (3)
• For CIO/CSO
• Learning to say “NO!”
• Growing legal and corporate
responsibility
• Start with the simple
• PINPad experience!
• Learn trusted systems
47
ISRC
Information
Security
Research
Centre
at
QUT
48
THANK
YOU.
20th
ANNIVERSARY
49